User’s Manual Figure 5-76 PowerUp settings Step 2 Step 3 Select the Enable checkbox to enable power up motion. Select power up motion from Preset, Tour, Scan, Pattern or Auto. Step 4 Step 5 Select Auto and the last motion before you shut down the Device last time will be performed. Select the action number of the selected motion. Click Save. 5.4.2.9 PTZ Limit After you set the PTZ limit, the Device can only move in the defined area. Step 1 Select Setting > PTZ > Function > PTZ Limit.
User’s Manual Step 3 Step 4 Step 5 Adjust the PTZ direction, and then click Setting to set the Down Line. Click Live to preview the already-set up line and down line. Select the Enable checkbox to enable the PTZ limit function. 5.4.2.10 Time Task After you set time task, the Device performs the selected motions during the defined period. Set Preset, Tour, Scan or Pattern in advance. Step 1 Select Setting > PTZ > Function > Time Task.
User’s Manual Figure 5-79 PTZ restart Step 2 Click PTZ Restart. The PTZ is restarted. 5.4.2.12 Default With the function, you can restore the PTZ to factory defaults. This function will restore the Device to defaults. Think twice before performing the operation. Step 1 Select Setting > PTZ > Function > Default.
User’s Manual Figure 5-80 Default setting Step 2 Click Default. The PTZ will be restored to factory defaults. 5.5 Event Management 5.5.1 Video Detection Video detection includes three event types: Motion Detection, Video Tamper and Scene Changing. 5.5.1.1 Motion Detection When the moving object appears and moves fast enough to reach the preset sensitivity value, alarms will be triggered. Step 1 Select Setting > Event > Video Detection > Motion Detection.
User’s Manual Figure 5-81 Motion detection settings Step 2 Select the Enable check box, and then configure motion detection parameters. ● Set arming and disarming period. 1. Click Setting, and then set the arming period on the page. Figure 5-82 Arming period settings 2. Set the alarm period to enable alarm events in the period you set. ◇ There are 6 time periods for each day.
User’s Manual period to enable it. ◇ Select the day of week (Sunday is selected by default; If All is selected, the setting is applied to the whole week. You can also select the check box next to the day to set it separately). 3. After completing the settings, click Save. You will return to the Motion Detection page. ● Set the area. Click Setting, and the Area page is displayed. Refer to Table 5-25 and Table 526 for parameters description.
User’s Manual ● Other parameters Table 5-26 Description of video detection parameter Parameter Description Anti-Dither The system records only one motion detection event within the defined period. The value range is 0–100 s. Enable Manual Control Trigger After you enable the function, the motion detection events that occur when you control the PTZ manually will be excluded. In this way, you can reduce the false alarm rate of such events.
User’s Manual Figure 5-84 Video tamper settings Step 2 Select the Enable check box, and then configure video tamper parameters. Step 3 For parameters configuration, see "5.5.1.1 Motion Detection". Click Save. 5.5.1.3 Scene Changing Alarms will be triggered if there is scene changing. Step 1 Select Setting > Event > Video Detection > Scene Changing. Figure 5-85 Scene changing settings Step 2 Select the Enable check box, and then configure scene changing parameters.
User’s Manual Step 3 For parameters configuration, see "5.5.1.1 Motion Detection". Click Save. 5.5.2 Smart Motion Detection After you set smart motion detection, when the human, non-motor vehicles and motor vehicles appear and move fast enough to reach the preset sensitivity value, the alarm linkage actions will be performed. The function can help you to avoid the alarms triggered by natural environment change.
User’s Manual 3. Select the effective object and sensitivity. ● Effective object: Select Human or Motor Vehicle. When Human is selected, both people and non-motor vehicles will be detected. ● Sensitivity: Select High, Medium, or Low. The higher the sensitivity, the easier the alarm is triggered. 4. Click Save. 5.5.3 Audio Detection Step 1 Select Setting > Event > Audio Detection > Audio Detection. Figure 5-87 Audio detection settings Step 2 Configure audio detection parameter.
User’s Manual Table 5-27 Description of audio detection parameter Parameter Description Input Abnormal Select Input Abnormal, and then an alarm is triggered when there is abnormal audio input. Intensity Change Select Intensity Change, and then an alarm is triggered when the change in sound intensity exceeds the defined threshold. Sensitivity The value ranges from 1 to 100. The smaller this value is, the larger the input sound volume changes are needed for it to be judged as an audio anomaly.
User’s Manual Step 2 (Optional) Click to enable Auto Tracking. When enabling auto tracking, you do not need to configure smart plans, and the Device performs auto tracking based on internal mechanism. If auto tracking and alarm track of the smart plan (such as IVS) are both enabled, the Device perform tracking in the order of triggering time. It is recommended to disable auto tracking when alarm track is enabled to avoid disordered tracking. Step 3 Click to select the presets to be configured.
User’s Manual ● Try to reduce the complexity of monitoring scenes. It is not recommended to enable IVS in scenes with dense targets and frequent light changes. ● Try to avoid the following scenes: scenes with reflective surfaces such as glass, bright ground or water; scenes that disturbed by tree branches, shadows or winged insects; scenes that against light or under direct light exposure. Before using the function, you need to set presets in advance. For setting methods, see "5.3.2.1 Preset.
User’s Manual Figure 5-91 Tripwire rule settings Step 2 Click Draw Rule, and you can draw rules on the monitoring screen. Click Clear to the right of Draw Rule to clear all drawn rules. Table 5-28 Description of rule drawing parameter Parameter Description Max Size Set the size range of detection targets to be filtered, and select the maximum or minimum size. ● Max Size: Set the maximum size of targets to be filtered. When the target is larger than this size, the system will ignore it.
User’s Manual Parameter Lock/Unlock Step 3 Description Enter the rule configuration page, and the locking function will be automatically enabled, and the locking time is 180 s. During this period, the device cannot track the target. Click Unlock to release the control. The locking function only takes effect in the rule configuration page. After switching to the Live page, the Device can track the target normally. Configure tripwire parameter.
User’s Manual 5.5.5.2 Intrusion Intrusion includes crossing areas and in-area functions. ● Crossing area means an alarm will be triggered when a target enters or leaves the area. ● In-area function means an alarm will be triggered when a specified number of targets appear in a set alarming area at a given time. In-area function only counts the number of targets in the detection area, regardless of whether they are the same targets.
User’s Manual Table 5-30 Description of intrusion parameter Parameter Description Action Configure intrusion action, and you can select Appear or Cross. Direction Select the crossing direction from Enters, Exits, and Enter & Exit. Step 4 For other parameters, see "5.5.5.1 Tripwire". Click Save. 5.5.5.3 Abandoned Object An alarm will be triggered when the selected target in the monitoring scene stays in the screen for more than the defined time.
User’s Manual Step 3 Click Clear to the right of Draw Rule, and you can clear all drawn rules. Configure abandoned object parameter. Table 5-31 Description of abandoned object parameter Parameter Description Duration For abandoned object, the duration is the shortest time to trigger an alarm after an object is abandoned. Step 4 For other parameters, see "5.5.5.1 Tripwire". Click Save. 5.5.5.
User’s Manual Step 2 Step 3 Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. Click Clear to the right of Draw Rule to clear all drawn rules. Configure missing object parameter. Table 5-32 Description of missing object parameter Parameter Description Duration Configure the shortest time from the object disappearing to the alarm being triggered. Step 4 For other parameters, see "5.5.5.1 Tripwire". Click Save. 5.5.
User’s Manual Figure 5-96 Plan by preset at the upper-right corner of the Area Config section. Step 3 Click Step 4 Double click the rule name to modify it. Click to draw rule box on the video image, and then right-click to complete drawing. Step 5 ● After drawing is complete, drag the corners of the drawn area to adjust the detection area. ● If you select preset plan, 8 detection areas can be drawn at most. Select the check box before the event type to enable the corresponding detection rule.
User’s Manual Figure 5-97 Helmet detection Figure 5-98 Workwear detection 124
User’s Manual Figure 5-99 Lone working detection Figure 5-100 Absence detection Table 5-34 Parameter description Parameter Description Allowed Color When configuring helmet detection, you can set allowed colors. When the helmet detected is not in the selected colors, alarms will be triggered.
User’s Manual Parameter Description Duration When events not following the rule are detected and the duration exceeds the defined value, alarms will be triggered. For example, when the duration of helmet detection is 5 seconds, if the Device detects a person not wearing helmet or the helmet color is not allowed for more than 5 seconds, an alarm will be triggered.
User’s Manual If you want to see the alarm information on the Alarm tab, you need to subscribe the corresponding alarm type. For details, see "6 Alarm". Result Click the AI Live tab to view construction monitoring results. For details, see "3.2 AI Live Settings". 5.5.7 Face Recognition The function can detect faces and compare them with those in the configured face database. ● Select Setting > Event > Smart Plan to enable face recognition. ● This function is available on select models. 5.5.7.
User’s Manual Parameter Description Face Enhancement Select Face Enhancement to preferably guarantee clear faces with low stream. Select Record, and the system records video when alarms are triggered. Record To enable video recording, you need to make sure that: ● The motion detection recording is enabled. For details, see "5.6.1.1 Record". ● The auto recording is enabled. For details, see "5.6.4 Record Control".
User’s Manual Figure 5-102 Face database config Step 2 Click Add Face Database. Figure 5-103 Add face database Step 3 Step 4 Set face database name. Click OK to complete the addition. Figure 5-104 Add face database completed Step 5 Configure face database configuration parameters. Table 5-36 Description of face database config parameter Parameter Description Deploy Select Deploy and the face database takes effect.
User’s Manual Manual Addition Add a single face image. Use this method when registering a small number of face images. Step 1 Select Setting > Event > Face Recognition > Face Database Config. Step 2 Click More Info for the face database to be configured. Figure 5-105 More info Step 3 Set filtering conditions, and then click Search. The search result is displayed. Click Registration. Figure 5-106 Registration interface Step 4 Click Upload Picture, and then import the face pictures to be uploaded.
User’s Manual Figure 5-107 Addition completed Step 5 Step 6 Fill in face image information. Click Add to task list. Step 7 Click . Figure 5-108 Task list addition completed Click Remove All to remove all the tasks. Batch Registration You can import multiple face images in batches. Use this method when registering a large number of face images. Before importing images in batches, name the face images in the format of "Name#SGender#BDate of Birth#NRegion#TCredentials Type#MID No.
User’s Manual Name is required and the rest are optional. Table 5-37 Naming rules for batch import Naming Rules Description Name Enter the corresponding name. Gender Enter a number. 1: Male; 2: Female. Date of Birth Enter numbers in the format of yyyy-mm-dd. For example, 201711-23. Region Enter the region name. Credentials Type Enter a number. 1: ID card; 2: passport. ID No. Enter ID No. Step 1 Select Setting > Event > Face Recognition > Face Database Config.
User’s Manual Figure 5-110 Batch registration Step 5 Click Browse. Figure 5-111 Registering Step 6 After the registration is completed, click Next to view the registration result. 5.5.7.2.3 Managing Face Images You can add face images to face database; manage and maintain face images to ensure correct information. Modifying Face Information On the Face Database Config page, move the mouse pointer to the face image or person information line, and then click or .
User’s Manual Figure 5-112 Registration page Deleting Face Images Enter face database, and then delete the created face image. ● Single deletion: Move the mouse pointer to the face image or people information line, and then click or to delete the face image. ● Batch deletion: Move the mouse pointer to the face image or people information line, and then click at the upper right corner of the face images, or click on person information line.
User’s Manual Figure 5-113 Face database page Step 3 Select the face images for modeling Click to view the face image in a list. Click to view the face image as a thumbnail. ● Modeling All Click Modeling All, and all face images in the face database will be modeled. ● Selective Modeling If there are many face images in the face database, set filtering conditions and then click Search to select face images for modeling. Figure 5-114 Modeling completed 5.5.7.
User’s Manual Table 5-38 Description of alarm linkage parameter Parameter Description Face Database Select the face database to be configured with alarm linkage. Alarm Rule Select the alarm rule as needed. Relay-out Select the Relay-out check box, and when an alarm is triggered, the system interacts with the linked alarm devices. Alarm Delay The alarm will continue for an extended period of time. The value range is 1–300 s. Step 3 Click Save. 5.5.
User’s Manual Figure 5-116 People counting settings Step 2 Step 3 Step 4 Select the presets to be configured. Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. Click Clear to the right of Draw Rule, and you can clear all drawn rules. Configure people counting parameter. Table 5-39 Description of people counting parameter Parameter Description OSD Display the number of people displayed in the area in real time.
User’s Manual 5.5.8.2 Report You can view the statistics results of people in the scene during the selected period. Step 1 Select Setting > Event > People Counting > Report. Figure 5-117 People counting report Step 2 Step 3 Step 4 Step 5 Step 6 Select a preset. Select the Rule, Statistics Type, and Time Range. Select the start time and end time for searching reports. Select Flow Direction and Chart Type. Click Search to generate reports, and then click Export to export the report to local storage. 5.5.
User’s Manual Figure 5-118 Heat map Step 2 Step 3 Step 4 Step 5 Select the presets to be configured. Select the Enable check box to enable heat map function. Click Setting to set the arming period. For details, see "5.5.1.1 Motion Detection". Click Save. 5.5.9.2 Report You can view the heat map report for the scene in the selected period. Step 1 Select Setting > Event > Heat Map > Report. Step 2 Set the start time and end time to search for the heat map report. Step 3 Select a preset.
User’s Manual Figure 5-119 Report 5.5.10 Video Metadata With the function, the system can count the number of motor vehicles, non-motor vehicles and people in the monitoring screen, identify the features of the vehicles and people in the scene, and take snapshots. ● Before using video metadata, you need to enable the function in the Smart Plan. ● This function is available on select models. 5.5.10.1 Scene Setting Set the parameters of snapshot, analysis and alarm in the scene.
User’s Manual Figure 5-120 Scene setting Step 2 Click the Preset list to select the preset to configure video metadata. Step 3 Click Step 4 Modify the parameters. ● Double-click the name to modify the rule name. ● Select the rule type from People, Non-motor Vehicle and Motor Vehicle. to add a rule type. ● Click the corresponding Step 5 to delete detection items. Configure scene setting parameters.
User’s Manual 5.5.10.2 Picture Overlay Set the overlay information on the snapshot. Step 1 Select Setting > Event > Video Metadata > Overlay. Step 2 Select Picture Overlay Type from People, Non-motor Vehicle and Motor Vehicle.
User’s Manual Figure 5-123 Picture overlay–people Step 3 Select overlay information. Step 4 If you select Location, you need to manually enter the location of the Device. Click Save. 5.5.10.3 Report You can view the number of vehicles, non-vehicles and people in the scene during the selected period. Step 1 Select Setting > Event > Video Metadata > Report. Step 2 Select the Report Type. Step 3 Select the start time and end time for searching reports. Step 4 Select Traffic Flow Statistics Type.
User’s Manual 5.5.11 Alarm Step 1 Select Setting > Event > Alarm. Figure 5-125 Alarm Step 2 Configure alarm setting parameters. Table 5-41 Description of alarm setting parameter Parameter Description Enable Select the Enable check box, and then the alarm linkage is enabled. Relay-in Select alarm input, and 7 alarm inputs are available. Sensor Type There are two types: NO (normally open) and NC (normally closed). Switch from NO to NC, and alarm event will be enabled.
User’s Manual 5.5.12.1 SD Card In case of an SD card exception, an alarm will be triggered. Step 1 Select Setting > Event > Abnormality > SD Card.
User’s Manual Step 2 Configure SD card exception parameters. Table 5-42 Description of SD card exception parameter Parameter Description Enable Select the check box to enable this function. Capacity Limit Configure the free space percentage, and if the free space in the SD card is less than the defined percentage, an alarm is triggered. Step 3 For other parameters, see "5.5.1.1 Motion Detection". Click Save. 5.5.12.2 Network Exception In case of a network exception, an alarm will be triggered.
User’s Manual Step 2 Configure network exception parameters. Table 5-43 Description of network exception parameter Parameter Description Enable Select the check box to enable this function. Step 3 For other parameters, see "5.5.1.1 Motion Detection". Click Save. 5.5.12.3 Illegal Access Illegal access alarm is triggered when the login password has been wrongly entered for more than the times you set. Step 1 Select Setting > Event > Abnormality > Illegal Access.
User’s Manual Figure 5-132 Security exception Step 2 Step 3 Configure security exception parameter. For details, see "5.5.1.1 Motion Detection". Click Save. 5.5.12.5 Battery Exception When overtemperature of the battery is detected, alarm linkage actions are performed. Step 1 Select Setting > Event > Abnormality > Battery Exception. Figure 5-133 Battery exception Step 2 Step 3 Step 4 Select the Enable check box to enable battery exception detection. Set alarm linkage actions. Click Save.
User’s Manual 5.6 Storage 5.6.1 Schedule Before setting the schedule, make sure that the Record Mode is Auto in Record Control. If the Record Mode is Off, the Device will not record or take snapshots according to the schedule. 5.6.1.1 Record Step 1 Select Setting > Storage > Schedule > Record. Figure 5-134 Record Step 2 Select the day for recording from Monday to Sunday, and then click Setting on the right. ● Set the recording period. You can set up to six periods for one day.
User’s Manual Figure 5-135 Record schedule setting Step 3 Click Save to return to the Record page. At this time, the colored chart visually displays the defined period. ● : Represents general recording. ● : Represents motion detection recording. ● : Represents alarm recording. Figure 5-136 Recording schedule setting completed Step 4 On the Record page, click Save, and the Save Succeeded! prompt will be displayed, which means the recording schedule has been set. 5.6.1.
User’s Manual Figure 5-137 Snapshot Step 2 Step 3 Set snapshot schedule. For details, refer to Step2 and Step3 in "5.6.1.1 Record". Click Save, and the Save Succeeded! prompt will be displayed, which means the snapshot schedule has been set. 5.6.1.3 Holiday Schedule You can set specific dates as holidays. Step 1 Select Setting > Storage > Schedule > Holiday Schedule.
User’s Manual Step 2 Step 3 Step 4 Step 5 Select a date. The selected date will be a holiday and displayed in yellow. Select Record or Snapshot, and then click Save. The Save Succeeded! prompt will be displayed. On the Record or Snapshot page, click Setting to the right of Holiday. The setting method is the same as that of Monday to Sunday. Set the period of one day for the Holiday, and the recording or snapshot will be taken according to the holiday time period. 5.6.
User’s Manual 5.6.3 Destination 5.6.3.1 Path Configure the storage path of recordings and snapshots of the Device, and select local SD card, FTP and NAS for storage. Store recordings and snapshots according to the event type, respectively corresponding to General, Motion and Alarm in the schedule, and then select the corresponding type of recordings or snapshots for storage. Step 1 Select Setting > Storage > Destination > Path.
User’s Manual Figure 5-141 FTP settings Step 2 Select the Enable check box to enable FTP function. Step 3 ● There might be risks if the FTP function is enabled. Think twice before enabling the function. ● SFTP is recommended to ensure network security. Configure FTP parameters. Table 5-46 FTP parameter description Parameter Description Server Address The IP address of the FTP server. Port The port number of the FTP server. Username The username to log in to the FTP server.
User’s Manual Dual SD cards are supported by some devices. For such devices, the SD card first inserted is called Local Disk 1, and the SD card inserted later is called Local Disk 2. ● If no recordings in both cards, the recording will be saved to Local Disk 1, and then saved to Local Disk 2 when Disk 1 is full. ● If there are recordings in both cards, the recording will be saved to the card with the latest recordings, and then saved to the other card when this card is full.
User’s Manual Table 5-47 NAS parameter description Parameter Description Select the check box to enable NAS function. Select NFS or SMB function. Enable There might be risks if NFS or SMB is enabled. Think twice before enabling the function. Server Address The IP address of the NAS server. Remote Directory Step 3 Click Save. The destination path on the NAS server. 5.6.4 Record Control Step 1 Select Setting > Storage > Record Control.
User’s Manual Parameter Description Disk Full You can select Stop or Overwrite. ● Stop: The system stops recording when the disk is full. ● Overwrite: The system overwrites the oldest files and keeps recording when the disk is full. The data will be overwritten if the disk is full. Back up the file in time as needed. You can select Auto, Manual or Off. Select Manual mode to start recording immediately, and select Auto mode to record within the schedule. Record Mode Select Main Stream or Sub Stream.
User’s Manual 5.7.1.2 Date & Time Step 1 Select Setting > System > General > Date&Time. Figure 5-146 Date & time Step 2 Configure date &time parameters. Table 5-50 Description of date & time parameter Parameter Description Date Format Select the date format. Three formats are available: YYYY-MMDD, MM-DD-YYYY and DD-MM-YYYY. Time Format Select the time format. Two formats are available: 24-Hour and 12-Hour. Time Zone Set the local time zone. Current Time The current time of the Device.
User’s Manual Step 3 Click Save. 5.7.1.3 Screen Off Settings The function is available on select models. You can set the screen-off time of the device display. Step 1 Select Setting > System > General > Screen Off Settings. Figure 5-147 Screen off settings Step 2 Step 3 Set screen-off time. ● Never: The screen is never turned off. ● Custom: Customize the screen-off time. Click Save. 5.7.2 Account Settings 5.7.2.1 Account User management is only available for admin users.
User’s Manual Figure 5-148 Account interface No permission is available for version information and other buttons except Relay-out, Mark, and Wiper Control on the Live interface for the time being. Anonymous Login Select the Anonymous Login check box, and you can log in to the Device anonymously without username and password after entering IP. Anonymous users only have preview permission in the permission list. In the anonymous login, click Logout to log in to the Device by using other usernames.
User’s Manual Figure 5-149 Add users Step 2 Step 3 Enter Username and Password, confirm password, select Group Name, and then add Memo. Set Operation Permission and Restricted Login. ● Operation Permission: Click Operation Permission, and then select the operation permission of the user as needed. ● Restricted Login: Click Restricted Login, and the interface shown in Figure 5150 is displayed. You can control login to the Device by setting the IP Address, Validity Period and Time Range.
User’s Manual Figure 5-150 Restricted login Step 4 Click Save. Modifying Users Step 1 Click corresponding to the user you want to modify.
User’s Manual Figure 5-151 Modify users Step 2 Step 3 Modify user information. Click Save. Modifying Password Step 1 Step 2 Step 3 Select the Modify Password check box. Enter old password and new password, and then confirm password. Click Save. Deleting Users Click corresponding to the user to be deleted, and the user can be deleted. Users/user groups cannot be recovered after deletion. Think twice before performing the operation. 5.7.2.1.
User’s Manual Configuring User Group The default authorities of Admin group includes live, playback, storage, file backup, user, system, system info, manual control, maintenance, peripheral, PTZ, security, network, event and AV parameters; the default authorities of User group include live and playback. Table 5-51 Description of user group parameters Group Authority Admin User Functions User YES NA Add, delete and check user/user group. Live YES YES Real-time stream view.
User’s Manual Deleting Groups For specific operations, refer to "5.7.2.1.1 Username". 5.7.2.2 ONVIF User On the web page, you can add ONVIF users, or modify existing users. Procedure Step 1 Select Setting > System > Account > Onvif User. Figure 5-153 Onvif user Step 2 Click Add User. Figure 5-154 Add users Step 3 Step 4 Set the username and password, confirm password, and then select the group name. Click Save. Related Operations ● Click to modify user information. ● Click to delete users. 5.7.
User’s Manual Figure 5-155 RTSP authentication Step 2 Select the Authorize Mode. You can select from Digest, Basic and None. It is Digest by default. ● Click Default, and Digest is selected automatically. ● Select None, and "Non-authentication mode may have risk. Are you sure to enable it" prompt will be displayed. Think twice before selecting the mode. ● Select Basic mode, and "Basic authentication mode may have risk. Are you sure to enable it?" prompt will be displayed.
User’s Manual Table 5-52 Description of system service parameter Function Description You can enable SSH authentication to perform safety management. The function is disabled by default. SSH It is recommended to disable SSH. If this function is enabled, there might be security risks. Multicast/Broadcast Search Enable this function, and when multiple users are viewing the monitoring screen simultaneously through network, they can find the Device through multicast/broadcast protocol.
User’s Manual 5.7.3.3 HTTPS It is recommended to enable HTTPS service. If the service is disabled, there might be risk of data leakage. Create certificate or upload signed certificate, and then you can log in through HTTPS with your PC. HTTPS can ensure data security, and protect user information and device security with reliable and stable technology. Step 1 Create certificate or upload the signed certificate. ● If you select Create Certificate, refer to the following steps.
User’s Manual Figure 5-158 HTTPS (2) 3) Enter the required information, and then click Create. The entered IP or domain name must be the same as the IP or domain name of the Device. 4) Click Install to install the certificate on the Device. Figure 5-159 Certificate installation 5) Click Download to download root certificate.
User’s Manual Figure 5-160 Download root certificate 6) Select storage path, and then click Save. 7) Double-click the RootCert.cer icon. Figure 5-161 Certificate information 8) Click Install Certificate.
User’s Manual Figure 5-162 Certificate import wizard 9) Click Next, and then select Trusted Root Certification Authorities. Figure 5-163 Certificate storage area 10) Click Next.
User’s Manual Figure 5-164 Completing the certificate import wizard 11) Click Finish. Figure 5-165 Security warning 12) Click Yes, and then click OK to complete the certificate installation.
User’s Manual Figure 5-166 Import success ● If you select Install Signed Certificate, refer to the following steps. 1) Select Setting > System > Safety > HTTPS. Figure 5-167 Install signed certificate Step 2 2) Click Browse to upload the signed certificate and certificate key, and then click Upload. 3) Install the root certificate. For details, see 5) to 12) in Step1. Select Enable HTTPS, and then click Save. The configuration takes effect after reboot. Figure 5-168 Reboot Enter https://xx.xx.xx.
User’s Manual ● If HTTPS is enabled, you cannot access the Device through HTTP. The system will switch to HTTPS if you access the Device through HTTP. ● The deletion of created and installed certificates cannot be restored. Think twice before deleting them. 5.7.3.4 Firewall Set a firewall for the Device to prevent network attacks after the Device is connected to the network. Step 1 Select Setting > System > Safety > Firewall.
User’s Manual Table 5-53 Description of wiper setting parameter Parameter Description Mode Set the wiper mode. It is Manual by default. In Manual mode, you need to manually start the wiper. Interval Time The time between wiper starting to wiper ending. Working Duration Set the maximum duration of the wiper operating once in Manual mode. The value ranges from 10 minutes to 1440 minutes. Step 3 Click Save. 5.7.
User’s Manual Figure 5-172 Import/Export Step 2 Step 3 Click Export to export the configuration file (.backup file) to the local storage path. Click Import on the Import/Export page of the Device to be configured to import the configuration file, and the Device will complete the configurations. 5.7.7 System Maintenance 5.7.7.1 Auto Maintain You can select Auto Reboot or Auto Delete Old Files. ● If you select Auto Reboot, the frequency and time need to be set.
User’s Manual Step 3 Click Save. 5.7.7.2 Emergency Maintenance By enabling emergency maintenance, you can fix most issues caused by upgrade and configuration. Step 1 Select Setting > System > Auto Maintain > Emergency Maintenance. Figure 5-174 Auto maintain Step 2 Click Save. 5.7.8 Upgrade Upgrade the system to improve device function and stability. If wrong upgrade file has been used, restart the Device; otherwise some functions might not work properly. Select Setting > System > Upgrade.
User’s Manual will be system notice if any upgrade is available. We need to collect the data such as IP address, device name, firmware version, and device serial number to perform auto-check. The collected information is only used to verify the legitimacy of the Device, and push the upgrade notification. 2. Click Save. Click Manual Check, and you can check for upgrade manually. 5.8 Information You can view information such as version, online users, log, and life statistics. 5.8.
User’s Manual Figure 5-177 Log Table 5-55 Log parameter description Parameter Description Start Time The start time of the log to be searched (January 1, 2000 is the earliest time). End Time The end time of the log to be searched (December 31, 2037 is the latest time). Type The log type includes All, System, Setting, Data, Event, Record, Account, Clear Log, and Safety. Search Set the start time and end time of the log to be searched, select the log type, and then click Search.
User’s Manual modifying group. ● Safety: Includes security-related information. ● Clear Log: Clearing logs. 5.8.2.2 Remote Log Upload the Device operations to the log server. Step 1 Select Setting > Information > Log > Remote Log. Figure 5-178 Remote log Step 2 Step 3 Select Enable to enable remote log function. Set the IP Address, Port and Device Number of the log server. Click Default to restore the Device to the default settings. 5.8.
User’s Manual The function is available on select models. Figure 5-180 Online users 5.8.5 Battery Status Select Setting > Information > Battery Status to view battery usage of the Device. The function is available on select models. Figure 5-181 Battery status 5.8.6 Legal Information Select Setting > Information > Legal Info to view legal information of the Device. Click Software License Agreement, Privacy Policy and Open Source Software Notice to respectively view the corresponding content.
User’s Manual The function is available on select models.
User’s Manual 6 Alarm You can select alarm types on the page. When the selected alarms are triggered, detailed alarm information will be displayed on the right side of the page. You can also select Prompt or Play Alarm Tone. When an alarm occurs, the alarm prompt or tone will be triggered. Figure 6-1 Alarm setting page Table 6-1 Description of alarm setting parameter Category Alarm Type Parameter Description Motion Detection Record alarm information in case of motion detection.
User’s Manual Category Operation Parameter Description Prompt Select the Prompt check box. When you are not on the Alarm page, and the selected alarm event is triggered, the Relay-out button on the main menu will change to , and the alarm information will be automatically recorded. After you click the Alarm menu bar, the button disappears.
User’s Manual 7 Logout Click Logout to log out, and the login page is displayed. Enter the username and password to log in again.
User’s Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
User’s Manual We suggest you to change default HTTP and other service ports into any set of numbers between 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing. 8.
User’s Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
User’s Manual